General

  • Target

    e2940fdfc2ece78ed388c98c5e866612cf2cb673cffcdbf03f5b2c4e6a667948

  • Size

    54KB

  • MD5

    04bb0da02c4f835a27a04b77952ca84d

  • SHA1

    1c7b88dad67bf3c953d2df9c3e29411cbe184e60

  • SHA256

    e2940fdfc2ece78ed388c98c5e866612cf2cb673cffcdbf03f5b2c4e6a667948

  • SHA512

    11dbd6eb197948995dea8ae72843b5b27c67e39a1fad236a0b919a0ac7104c969a660afe89ff599bc79a0eea22308021caf00d5cbc6e441fa95d06ff63d4d687

  • SSDEEP

    768:AqcyGIkugd0lIZYmMPRXQf+SFoK7ETpNRJM5c4KC8NgrIYCH0I+kW947f:ajI1gKlAODxKMMO4KPgrvCBj

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

172.20.118.193:1328

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • e2940fdfc2ece78ed388c98c5e866612cf2cb673cffcdbf03f5b2c4e6a667948
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections